Skip to content

Commit dbe002b

Browse files
Merge pull request #231939 from rwike77/wifref
added api ref links, fixed incorrect object ID mentions
2 parents cc5b4c0 + 55d30da commit dbe002b

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/active-directory/workload-identities/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To learn more about supported regions, time to propagate federated credential up
4040
- Get the information for your external IdP and software workload, which you need in the following steps.
4141
- To create a user-assigned managed identity and configure a federated identity credential, your account needs the [Contributor](../../role-based-access-control/built-in-roles.md#contributor) or [Owner](../../role-based-access-control/built-in-roles.md#owner) role assignment.
4242
- [Create a user-assigned manged identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity)
43-
- Find the object ID of the user-assigned managed identity, which you need in the following steps.
43+
- Find the name of the user-assigned managed identity, which you need in the following steps.
4444

4545
## Configure a federated identity credential on a user-assigned managed identity
4646

@@ -181,13 +181,13 @@ To delete a specific federated identity credential, select the **Delete** icon f
181181
- Get the information for your external IdP and software workload, which you need in the following steps.
182182
- To create a user-assigned managed identity and configure a federated identity credential, your account needs the [Contributor](../../role-based-access-control/built-in-roles.md#contributor) or [Owner](../../role-based-access-control/built-in-roles.md#owner) role assignment.
183183
- [Create a user-assigned manged identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azcli#create-a-user-assigned-managed-identity-1)
184-
- Find the object ID of the user-assigned managed identity, which you need in the following steps.
184+
- Find the name of the user-assigned managed identity, which you need in the following steps.
185185

186186
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/articles/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
187187

188188
## Configure a federated identity credential on a user-assigned managed identity
189189

190-
Run the [az identity federated-credential create](/cli/azure/identity/federated-credential#az-identity-federated-credential-create) command to create a new federated identity credential on your user-assigned managed identity (specified by the object ID of the app). Specify the *name*, *issuer*, *subject*, and other parameters.
190+
Run the [az identity federated-credential create](/cli/azure/identity/federated-credential#az-identity-federated-credential-create) command to create a new federated identity credential on your user-assigned managed identity (specified by the name). Specify the *name*, *issuer*, *subject*, and other parameters.
191191

192192
```azurecli
193193
az login
@@ -282,7 +282,7 @@ az identity federated-credential delete --name $ficId --identity-name $uaId --re
282282
- Use [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open by using the **Try It** button in the upper-right corner of code blocks.
283283
- Run scripts locally with Azure PowerShell, as described in the next section.
284284
- [Create a user-assigned manged identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-powershell#list-user-assigned-managed-identities-2)
285-
- Find the object ID of the user-assigned managed identity, which you need in the following steps.
285+
- Find the name of the user-assigned managed identity, which you need in the following steps.
286286

287287
### Configure Azure PowerShell locally
288288

@@ -312,7 +312,7 @@ To use Azure PowerShell locally for this article instead of using Cloud Shell:
312312

313313
## Configure a federated identity credential on a user-assigned managed identity
314314

315-
Run the New-AzFederatedIdentityCredentials command to create a new federated identity credential on your user-assigned managed identity (specified by the object ID of the app). Specify the *name*, *issuer*, *subject*, and other parameters.
315+
Run the [New-AzFederatedIdentityCredentials](/powershell/module/az.managedserviceidentity/new-azfederatedidentitycredentials) command to create a new federated identity credential on your user-assigned managed identity (specified by the name). Specify the *name*, *issuer*, *subject*, and other parameters.
316316

317317
```azurepowershell
318318
New-AzFederatedIdentityCredentials -ResourceGroupName azure-rg-test -IdentityName uai-pwsh01 `
@@ -321,23 +321,23 @@ New-AzFederatedIdentityCredentials -ResourceGroupName azure-rg-test -IdentityNam
321321

322322
## List federated identity credentials on a user-assigned managed identity
323323

324-
Run the Get-AzFederatedIdentityCredentials command to read all the federated identity credentials configured on a user-assigned managed identity:
324+
Run the [Get-AzFederatedIdentityCredentials](/powershell/module/az.managedserviceidentity/get-azfederatedidentitycredentials) command to read all the federated identity credentials configured on a user-assigned managed identity:
325325

326326
```azurepowershell
327327
Get-AzFederatedIdentityCredentials -ResourceGroupName azure-rg-test -IdentityName uai-pwsh01
328328
```
329329

330330
## Get a federated identity credential on a user-assigned managed identity
331331

332-
Run the Get-AzFederatedIdentityCredentials command to show a federated identity credential (by ID):
332+
Run the [Get-AzFederatedIdentityCredentials](/powershell/module/az.managedserviceidentity/get-azfederatedidentitycredentials) command to show a federated identity credential (by name):
333333

334334
```azurepowershell
335335
Get-AzFederatedIdentityCredentials -ResourceGroupName azure-rg-test -IdentityName uai-pwsh01 -Name fic-pwsh01
336336
```
337337

338338
## Delete a federated identity credential from a user-assigned managed identity
339339

340-
Run the Remove-AzFederatedIdentityCredentials command to delete a federated identity credential under an existing user assigned identity.
340+
Run the [Remove-AzFederatedIdentityCredentials](/powershell/module/az.managedserviceidentity/remove-azfederatedidentitycredentials) command to delete a federated identity credential under an existing user assigned identity.
341341

342342
```azurepowershell
343343
Remove-AzFederatedIdentityCredentials -ResourceGroupName azure-rg-test -IdentityName uai-pwsh01 -Name fic-pwsh01
@@ -353,7 +353,7 @@ Remove-AzFederatedIdentityCredentials -ResourceGroupName azure-rg-test -Identity
353353
- Get the information for your external IdP and software workload, which you need in the following steps.
354354
- To create a user-assigned managed identity and configure a federated identity credential, your account needs the [Contributor](../../role-based-access-control/built-in-roles.md#contributor) or [Owner](../../role-based-access-control/built-in-roles.md#owner) role assignment.
355355
- [Create a user-assigned manged identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-arm#create-a-user-assigned-managed-identity-3)
356-
- Find the object ID of the user-assigned managed identity, which you need in the following steps.
356+
- Find the name of the user-assigned managed identity, which you need in the following steps.
357357

358358
## Template creation and editing
359359

@@ -473,7 +473,7 @@ Make sure that any kind of automation creates federated identity credentials und
473473
- To run in the cloud, use [Azure Cloud Shell](../../cloud-shell/overview.md).
474474
- To run locally, install [curl](https://curl.haxx.se/download.html) and the [Azure CLI](/cli/azure/install-azure-cli).
475475
- [Create a user-assigned manged identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-rest#create-a-user-assigned-managed-identity-4)
476-
- Find the object ID of the user-assigned managed identity, which you need in the following steps.
476+
- Find the name of the user-assigned managed identity, which you need in the following steps.
477477

478478
## Obtain a bearer access token
479479

@@ -491,7 +491,7 @@ Make sure that any kind of automation creates federated identity credentials und
491491
492492
## Configure a federated identity credential on a user-assigned managed identity
493493
494-
Create or update a federated identity credential on the specified user-assigned managed identity.
494+
[Create or update a federated identity credential](/rest/api/managedidentity/2022-01-31-preview/federated-identity-credentials/create-or-update) on the specified user-assigned managed identity.
495495
496496
```bash
497497
curl 'https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/provider
@@ -530,7 +530,7 @@ PUT https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/
530530

531531
## List federated identity credentials on a user-assigned managed identity
532532

533-
List all the federated identity credentials on the specified user-assigned managed identity.
533+
[List all the federated identity credentials](/rest/api/managedidentity/2022-01-31-preview/federated-identity-credentials/list) on the specified user-assigned managed identity.
534534

535535
```bash
536536
curl 'https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<USER ASSIGNED IDENTITY NAME>/<RESOURCE NAME>/federatedIdentityCredentials?api-version=2022-01-31-preview' -H "Content-Type: application/json" -X GET -H "Authorization: Bearer <ACCESS TOKEN>"
@@ -550,7 +550,7 @@ https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RES
550550

551551
## Get a federated identity credential on a user-assigned managed identity
552552

553-
Get a federated identity credential on the specified user-assigned managed identity.
553+
[Get a federated identity credential](/rest/api/managedidentity/2022-01-31-preview/federated-identity-credentials/get) on the specified user-assigned managed identity.
554554

555555
```bash
556556
curl 'https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<USER ASSIGNED IDENTITY NAME>/<RESOURCE NAME>/federatedIdentityCredentials/<FEDERATED IDENTITY CREDENTIAL RESOURCENAME>?api-version=2022-01-31-preview' -X GET -H "Content-Type: application/json" -H "Authorization: Bearer <ACCESS TOKEN>"
@@ -570,7 +570,7 @@ https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RES
570570

571571
## Delete a federated identity credential from a user-assigned managed identity
572572

573-
Delete a federated identity credential on the specified user-assigned managed identity.
573+
[Delete a federated identity credential](/rest/api/managedidentity/2022-01-31-preview/federated-identity-credentials/delete) on the specified user-assigned managed identity.
574574

575575
```bash
576576
curl 'https://management.azure.com/subscriptions/<SUBSCRIPTION ID>/resourceGroups/<RESOURCE GROUP>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<USER ASSIGNED IDENTITY NAME>/<RESOURCE NAME>/federatedIdentityCredentials/<FEDERATED IDENTITY CREDENTIAL RESOURCENAME>?api-version=2022-01-31-preview' -X DELETE -H "Content-Type: application/json" -H "Authorization: Bearer <ACCESS TOKEN>"

0 commit comments

Comments
 (0)